If this is your first visit, be sure to
check out the FAQ by clicking the
link above. You may have to register
before you can post: click the register link above to proceed. To start viewing messages,
select the forum that you want to visit from the selection below.

Yeah, it seems more a driver problem. Sorry, I don't have that model to test. Try to launch the commands out of airgeddon. You'll probably get the same result. The command for the capture is simple: airodump-ng -c "${channel}" -d "${bssid}" -w "${tmpdir}handshake" "${interface}"

Regarding more news on airgeddon... on new 7.22 version the new Arcadyan PIN generation algorithm was implemented. It has a 100% of effectiveness on Orange-XXXX networks (very common in some countries like Spain for example). Another new submenu for WPS was added to calculate PINs offline using the different implemented algorithms. Everything is ready but I must wait for some translations... if anybody wants to test it, can be downloaded on "dev" branch using this command: git clone -b dev https://github.com/v1s1t0r1sh3r3/airgeddon

New features, a PIN can be generated using any integrated algorithm for a target. This also can be done offline, without launching any attack. And the PIN database can be queried to search for PINs of a target too.

As we said before, the Arcadyan algorithm is fully integrated too (bye bye Orange-XXXX networks! xdd). Can anybody give some feedback about this?

Hi! I added a new feature on v7.23. Is what I called the DoS pursuit mode. Is more an Evil Twin feature than a DoS feature because is not only available at DoS submenu, it's also available on Evil Twin attacks and is fully integrated with them.

DoS pursuit mode consists in keep a background scanning to detect if target AP changed its channel. If a change is detected, airgeddon warns you and re-launch the attack over the new channel. In this way, the AP channel hopping is avoided. Many APs could have channel configured as "auto" and after a restart could get another different channel and your Evil Twin attack could be useless if you don't detect it in time. Now with this optional modification there is no escape. This increases the Evil Twin effectiveness. To perform it, airgeddon offers the possibility of enabling it on Evil Twin attacks. It warns you that to perform it, another additional wireless interface is required. Of course there is a new intermediate submenu for this interface selection with all validations, etc.

Probably it will pass to master at the end of this month. It's ready and tested but we should wait for translations, etc. If anybody wants to test it, it can be downloaded from "dev" branch of github (as always). git clone -b dev https://github.com/v1s1t0r1sh3r3/airgeddon.git

This is another feature no present on other scripts I think

Now, starting to think about future v8.0 version... I want to add on it full 5ghz support.

It's already done under testing now and waiting for some translations but it will be on master branch very soon. You can download now from dev branch. You know how... git clone -b dev https://github.com/v1s1t0r1sh3r3/airgeddon.git

hi, I've installed you script on my raspberry pi 3 but i can't find hashcat for it. apt-get install hashcat says it's old and recommends hashcat-data. what attacks require hashcat? do i need some OpenCL for ARM for it to work?